Re: WISeKey root CA certificate inclusion request

2008-02-10 Thread Kyle Hamilton
On Feb 10, 2008 3:28 AM, Eddy Nigg (StartCom Ltd.) [EMAIL PROTECTED] wrote: Kyle, even so part of your argument might be correct, you are doing a great injustice to some of us here, specially to the ones which bother to review the CAs. Also Frank and Gerv invest quite some time into getting

Re: Reassessment of sub-ordinated CA certificates

2008-02-10 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker wrote: Eddy Nigg (StartCom Ltd.) wrote: snip ... _I'm requesting hereby and now to have thorough review of this situation and reassessment_ of the Mozilla CA policy concerning everything related to sub-ordinated CAs. This is a good discussion to have, and I agree

Re: WISeKey root CA certificate inclusion request

2008-02-10 Thread Eddy Nigg (StartCom Ltd.)
Kyle Hamilton wrote: However, the process itself is broken. The set of requirements are broken. The only weapon which can be used -- decertification -- is never (and will never, based on the Foundation's view of user convenience as trumping user security) used. This puts Frank into a

Re: Reassessment of sub-ordinated CA certificates

2008-02-10 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker wrote: Eddy Nigg (StartCom Ltd.) wrote: snip ... _I'm requesting hereby and now to have thorough review of this situation and reassessment_ of the Mozilla CA policy concerning everything related to sub-ordinated CAs. This is a good discussion to have, and I agree

Re: Reassessment of sub-ordinated CA certificates

2008-02-10 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Now, I have no clue how this is going to work and perhaps Nelson can give us some more informationexample: If AddTrust is going to be upgraded to an EV root, is any sub ordinated CA potentially an EV CA? I haven't yet looked in detail at the Network

Re: Reassessment of sub-ordinated CA certificates

2008-02-10 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker wrote: So the bottom line is that if a root CA is approved for EV, its subordinate CAs do *not* automatically gain the ability to issue EV certificates. Instead the root CA has to specifically enable a given subordinate to be EV-capable, by issuing it a CA certificate with the

Re: WISeKey root CA certificate inclusion request

2008-02-10 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Kyle Hamilton wrote: wnip I have not. I must point out, though, that Frank has essentially stated that it's impossible to remove an already-vetted CA. Did Frank say that? I don't think so... I didn't quite say that, but I can understand why Kyle interpreted

Re: Reassessment of sub-ordinated CA certificates

2008-02-10 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Thanks for this information. However from our (Mozilla) point of view, the root can sign X CA certificates able to sign EV certificates (directly and indirectly). The OID requirement is just cosmetically in respect of the capabilities once a root is marked

Re: Reassessment of sub-ordinated CA certificates

2008-02-10 Thread Nelson Bolyard
Eddy Nigg (StartCom Ltd.) wrote, On 2008-02-10 17:33: Network Solutions has a server certificate issued by Network Solutions EV SSL CA. Ever heard of this CA? Well, it's chained like this: AddTrust External CA Root from Sweden and belongs to Comodo from the United Kingdom -